Constructing Strong Identity-Based Designated Verifier Signatures with Self-Unverifiability
暂无分享,去创建一个
[1] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[2] Mihir Bellare,et al. The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs , 2006, EUROCRYPT.
[3] Olivier Markowitch,et al. An Efficient Strong Designated Verifier Signature Scheme , 2003, ICISC.
[4] Kenneth G. Paterson,et al. Pairings for Cryptographers , 2008, IACR Cryptol. ePrint Arch..
[5] Yi Mu,et al. Short (Identity-Based) Strong Designated Verifier Signature Schemes , 2006, ISPEC.
[6] Jonathan Katz,et al. Ring Signatures: Stronger Definitions, and Constructions without Random Oracles , 2006, Journal of Cryptology.
[7] Kazuki Yoneyama,et al. Rigorous Security Requirements for Designated Verifier Signatures , 2010, Inscrypt.
[8] Guomin Yang,et al. Efficient Strong Designated Verifier Signature Schemes without Random Oracles or Delegatability , 2009, IACR Cryptol. ePrint Arch..
[9] Yi Mu,et al. Identity-Based Strong Designated Verifier Signature Schemes , 2004, ACISP.
[10] Qiaoyan Wen,et al. A New Efficient ID-Based Strong Designated Verifier Signature Scheme , 2010, 2010 Third International Symposium on Information Science and Engineering.
[11] Yi Mu,et al. Short Designated Verifier Signature Scheme and Its Identity-based Variant , 2008, Int. J. Netw. Secur..
[12] Markus Jakobsson,et al. Designated Verifier Proofs and Their Applications , 1996, EUROCRYPT.
[13] Kaoru Kurosawa,et al. Tag-KEM/DEM: A New Framework for Hybrid Encryption , 2008, Journal of Cryptology.
[14] Dong Hoon Lee,et al. Forgery attacks on Kang et al.'s identity-based strong designated verifier signature scheme and its improvement with security proof , 2010, Comput. Electr. Eng..
[15] Fabien Laguillaumie,et al. Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map , 2004, SCN.
[16] Liqun Chen,et al. Identity-based key agreement protocols from pairings , 2017, International Journal of Information Security.
[17] Jianhong Zhang,et al. A novel ID-based designated verifier signature scheme , 2008, Inf. Sci..
[18] Xavier Boyen,et al. A tapestry of identity-based encryption: practical frameworks compared , 2008, Int. J. Appl. Cryptogr..
[19] Jonathan Katz,et al. Ring Signatures: Stronger Definitions, and Constructions without Random Oracles , 2005, IACR Cryptol. ePrint Arch..
[20] Ed Dawson,et al. A novel identity-based strong designated verifier signature scheme , 2009, J. Syst. Softw..
[21] Mihir Bellare,et al. Code-Based Game-Playing Proofs and the Security of Triple Encryption , 2004, IACR Cryptol. ePrint Arch..
[22] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[23] Ashutosh Saxena,et al. Identity Based Strong Designated Verifier Signature Scheme , 2007, Informatica.
[24] Guomin Yang,et al. Efficient strong designated verifier signature schemes without random oracle or with non-delegatability , 2011, International Journal of Information Security.